/frameworks/base/core/java/android/net/ |
NetworkScoreManager.java | 183 * @throws SecurityException if the caller is not the active scorer or privileged.
|
/frameworks/base/media/java/android/media/soundtrigger/ |
SoundTriggerDetector.java | 47 * granted only to system or privileged apps.
|
/frameworks/base/services/core/java/com/android/server/net/ |
LockdownVpnTracker.java | 167 // Use the privileged method because Lockdown VPN is initiated by the system, so
|
/libcore/ojluni/src/main/java/java/util/logging/ |
Handler.java | 224 * environments where the caller may be non-privileged.
|
/libcore/ojluni/src/main/java/sun/misc/ |
MetaIndex.java | 162 // This method must be called from a privileged context.
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/linux/ |
capability.h | 304 /* Allow the privileged aspects of mknod() */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
capability.h | 301 /* Allow the privileged aspects of mknod() */
|
/external/llvm/lib/Target/AArch64/Utils/ |
AArch64BaseInfo.cpp | 147 // v8.1a "Privileged Access Never" extension-specific PStates 779 // v8.1a "Privileged Access Never" extension-specific system registers
|
/external/tlsdate/src/ |
tlsdated.c | 512 /* fork off the privileged helper */ 516 error ("could not fork privileged coprocess");
|
/frameworks/base/core/java/android/app/usage/ |
NetworkStatsManager.java | 74 * privileged apps likewise get access to usage data for all users on the device. 80 * the above permission, even to access an app's own data usage, and carrier-privileged apps were
|
/libcore/ojluni/src/main/java/java/net/ |
URLClassLoader.java | 714 // Need a privileged block to create the class loader 738 // Need a privileged block to create the class loader
|
/packages/apps/PackageInstaller/src/com/android/packageinstaller/ |
PackageInstallerActivity.java | 342 // Privileged apps are not considered an unknown source. 604 // privileged system package before we use it [all...] |
/external/ppp/pppd/ |
auth.c | 390 "Allow group members to use privileged options", OPT_PRIV | OPT_A2LIST }, 472 * privgroup - allow members of the group to have privileged access. 488 privileged = 1; [all...] |
main.c | 148 int privileged; /* we're running as real uid root */ variable 340 privileged = uid == 0; 369 privileged = 1; 406 if (!options_from_file(_PATH_SYSOPTIONS, !privileged, 0, 1) [all...] |
/external/ipsec-tools/src/racoon/ |
racoon.conf.5 | 136 a privileged instance takes care of performing the following operations 174 privileged instance of [all...] |
/bionic/libc/upstream-freebsd/lib/libc/stdlib/ |
getopt_long.c | 580 * Furthermore, since many privileged programs call getopt()
|
/docs/source.android.com/src/devices/media/ |
framework-hardening.jd | 137 is the least privileged of all the services—it can't read FDs so instead
|
/docs/source.android.com/src/devices/tv/ |
HDMI-CEC.jd | 90 <li> A manager class <code>HdmiControlManager</code> provides privileged apps with the API. System services like TV Input Manager service and Audio service can grab the service directly.</li>
|
/docs/source.android.com/src/security/bulletin/ |
2015-09-01.jd | 198 execution in a privileged service that can bypass device protections,
|
/docs/source.android.com/src/security/selinux/ |
implement.jd | 163 lead to exploits. For instance, some privileged components such as init change
|
/external/autotest/client/tests/kvm/steps/ |
Fedora-8-64.steps | 241 # privileged user
|
/external/dnsmasq/ |
setup.html | 24 Note that dnsmasq needs to run as root, since it binds privileged ports. It will drop root privileges after start-up. Dnsmasq
|
/external/iproute2/doc/ |
api-ip6-flowlabels.tex | 233 One idea is to disallow not privileged user to allocate flow
|
/external/llvm/lib/Target/Sparc/ |
SparcRegisterInfo.td | 305 // Privileged Registers
|
/external/mesa3d/src/getopt/ |
getopt_long.c | 480 * Furthermore, since many privileged programs call getopt()
|